VMware Goes All-In On Containers
Google's Nest Thermostat Gets Redesign
iOS 9 Ad Blocking Could Alter Internet Commerce
Where Data Science Meets IT
Google OnHub Router: My First 24 Hours
News & Commentary
TEST - Ignore
Laurianne McLaughlin, Editor-in-Chief, InformationWeek.com
News
test summary
By Laurianne McLaughlin Editor-in-Chief, InformationWeek.com, 9/2/2015
Comment0 comments  |  Read  |  Post a Comment
Cyberspies Impersonate Security Researcher
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
'Rocket Kitten' pro-Iranian regime hackers focusing more on targeting individuals for geopolitical espionage.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/1/2015
Comment0 comments  |  Read  |  Post a Comment
Google's Nest Thermostat Gets Redesign
Thomas Claburn, Editor at Large, Enterprise Mobility
News
The updated Google Nest thermostat can now sense your presence from across the room.
By Thomas Claburn Editor at Large, Enterprise Mobility, 9/1/2015
Comment1 Comment  |  Read  |  Post a Comment
Samsung Gear S2 Watch Skips Android For Tizen
Eric Zeman,
Commentary
Samsung's Gear S2 smartwatch may have a pleasing design and the ability to make calls, but it is handicapped by the Tizen operating system.
By Eric Zeman , 9/1/2015
Comment1 Comment  |  Read  |  Post a Comment
Report: Ransomware Jumped 58 Percent in Q2
Sara Peters, Senior Editor at Dark Reading
News
McAfee Threat Labs Report also zooms in on GPU malware and looks back on the first five years of the Intel-McAfee marriage.
By Sara Peters Senior Editor at Dark Reading, 9/1/2015
Comment0 comments  |  Read  |  Post a Comment
Malware Pre-Installed On Over Two-Dozen Android Smartphone Brands
Jai Vijayan, Freelance writer
News
Threat affects several smartphones shipping from Asia including some popular ones such as Lenovo, Huawei, and Xiaomi, says G Data.
By Jai Vijayan Freelance writer, 9/1/2015
Comment0 comments  |  Read  |  Post a Comment
VMworld Puts Spotlight On NSX Customers
Marcia Savage, Managing Editor, Network Computing
News
Companies talk about their NSX deployments at the annual VMware user conference as VMware launches NSX 6.2 with new capabilities.
By Marcia Savage Managing Editor, Network Computing, 9/1/2015
Comment1 Comment  |  Read  |  Post a Comment
Google Self-Driving Car Prototype Cruises Into Austin
Nathan Eddy, Freelance Writer
News
Google's self-driving car will join its self-navigating Lexus vehicles in Austin this month.
By Nathan Eddy Freelance Writer, 9/1/2015
Comment1 Comment  |  Read  |  Post a Comment
iOS 9 Ad Blocking Could Alter Internet Commerce
Larry Loeb, Blogger, Informationweek
Commentary
Whether it's a cynical move or not, Apple's upcoming release of iOS 9 can give users the ability to block ads on a mobile browser. This is a serious concern for online advertisers.
By Larry Loeb Blogger, Informationweek, 9/1/2015
Comment8 comments  |  Read  |  Post a Comment
We Can Allow Cybersecurity Research Without Stifling Innovation
Gavin Reid, Vice President, Threat Intelligence, Lancope Inc
Commentary
The U.S. government is in a unique position to become a global leader in cybersecurity. But only if it retains the open spirit of the Internet that kick-started the Information Age.
By Gavin Reid Vice President, Threat Intelligence, Lancope Inc, 9/1/2015
Comment0 comments  |  Read  |  Post a Comment
VMware Goes All-In On Containers
Charles Babcock, Editor at Large, Cloud
News
New VMware products elevate containers from an afterthought to a primary vehicle for application delivery.
By Charles Babcock Editor at Large, Cloud, 9/1/2015
Comment1 Comment  |  Read  |  Post a Comment
Where Data Science Meets IT
InformationWeek Staff,
CommentaryVideo
See what happens when data scientist David Chudzicki of Kaggle sits down with Jackie Woods, director at UPS, to talk about the intersection of data science and IT at the InformationWeek Conference 2015.
By InformationWeek Staff , 9/1/2015
Comment0 comments  |  Read  |  Post a Comment
WiFi Hotspots, Routers Latest Front For Advertisers
Pablo Valerio, International Business & IT Consultant
Commentary
Recently, you may have noticed ad popping up when connecting through a router or public WiFi hotspot. It's the latest gimmick to serve up more advertising.
By Pablo Valerio International Business & IT Consultant, 9/1/2015
Comment0 comments  |  Read  |  Post a Comment
No Summer Slowdown For IT Pros
Network Computing Editors,
News
While other workers enjoyed traditional summer vacations, IT pros toiled away to keep the network running, an Ipswitch survey finds.
By Network Computing Editors , 9/1/2015
Comment1 Comment  |  Read  |  Post a Comment
10 Apple Slip-Ups That Bruised Its Reputation
Nathan Eddy, Freelance Writer
News
Apple is known for its consumer-friendly reputation, but this list proves Cameragate is only the latest in a long line of Apple foul-ups.
By Nathan Eddy Freelance Writer, 9/1/2015
Comment0 comments  |  Read  |  Post a Comment
Tackling Data Center Challenges With Open Ethernet
Gilad Shainer, Vice President of Marketing, Mellanox
Commentary
Data centers are under more pressure than ever. Open networking offers an alternative to closed-code Ethernet switches, giving companies better flexibility to meet growing data center demands.
By Gilad Shainer Vice President of Marketing, Mellanox, 9/1/2015
Comment0 comments  |  Read  |  Post a Comment
Apple, Cisco Team On iOS For Businesses
Thomas Claburn, Editor at Large, Enterprise Mobility
News
In a nod to Apple's growth among enterprise users, the two companies have entered a partnership to ensure Cisco products work well with iOS devices.
By Thomas Claburn Editor at Large, Enterprise Mobility, 9/1/2015
Comment2 comments  |  Read  |  Post a Comment
Sights & Sounds Of Black Hat USA And DEF CON
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Some hackers call the week of Black Hat USA and DEF CON 'security summer camp' -- a look at some of the highlights of the two shows.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/31/2015
Comment0 comments  |  Read  |  Post a Comment
Biggest Apple Account Theft Ever Hits Only JailBroken iOS Devices
Sara Peters, Senior Editor at Dark Reading
News
KeyRaider stole 225,000 legitimate Apple accounts and slammed devices with ransomware and phony purchases, but only jailbroken gear, mostly in China, is affected.
By Sara Peters Senior Editor at Dark Reading, 8/31/2015
Comment2 comments  |  Read  |  Post a Comment
Google, Sanofi Focus On Diabetes Data
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Google and Sanofi want to make real-time data more useful for diabetes patients and clinicians.
By Thomas Claburn Editor at Large, Enterprise Mobility, 8/31/2015
Comment3 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Facebook Claims 1 Billion Users In 1 Day
Larry Loeb, Blogger, Informationweek,  8/29/2015
Google Chrome Support For Flash Ads Ends Sept. 1
Larry Loeb, Blogger, Informationweek,  8/31/2015
10 Highest Paying Computer Science Programs
David Wagner, Executive Editor, Community & IT Life,  8/27/2015
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest August 03, 2015
The networking industry agrees that software-defined networking is the way of the future. So where are all the deployments? We take a look at where SDN is being deployed and what's getting in the way of deployments.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio